Sciweavers

91 search results - page 10 / 19
» Technological networks and the spread of computer viruses
Sort
View
NSPW
2006
ACM
14 years 1 months ago
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
Spyware, Adware, Bots. In each case, there is significant evidence that there is an increasing financial motivation behind the writing and distribution of these programs. In thi...
Richard Ford, Sarah Gordon
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 1 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
CAISE
2006
Springer
13 years 11 months ago
Context-aware Applications with Distributed Ontologies
This paper presents a framework for context-aware applications, with a particular focus on collaboration and pervasiveness. The framework relies on distributed ontologies, which ar...
Flavio De Paoli, Marco Loregian
CCS
2004
ACM
14 years 1 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 10 days ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath